-
"Tesla’s New Bug Bounty Protects Hackers — and Your Warranty"Tesla’s updated product security policy has declared that it will allow car owners to hack their own cars as long as they follow the rules of the company’s bug bounty program. The change is significant to security researchers as they will be…
-
"One of Most Popular Mac Apps Acts Like Spyware"A top-selling Mac app, called Adware Doctor, has been discovered by security researchers to be performing spyware activities. According to researchers, the app has been collecting data pertaining to its users and sending that data to a server in…
-
Game-theoretic Paper Wins Annual Paper CompetitionThe winner of the 6th Annual Best Scientific Cybersecurity Paper Competition is How Shall We Play a Game? A Game-theoretical Model for Cyber-warfare Games by Tiffany Bao, Yan Shoshitaishvili, Ruoyu Wang, Christopher Kruegel, Giovanni Vigna, and David…
-
"Army Research Takes Proactive Approach to Defending Computer Systems"There has been an advancement in the development of moving target defense (MTD) techniques for defending computer systems against cyberattacks by a team of researchers from the U.S. Army Research Laboratory, University of Canterbury in New Zealand, and…
-
"7 Ways Blockchain is Being Used for Security"Blockchain technology can be used as a tool to enhance security in a number of ways. The security of critical infrastructure, data, and more, can be improved through the use of blockchain technology. This article continues to discuss the growing…
-
"Do You Know How and Why You Forget Passwords?"A study led by Rutgers University–New Brunswick explores the reasons why people often fail to remember their passwords to accounts and websites. Findings of this study are expected to help in the improvement of password technology. The study…
-
"A Well-Known Hacking Group Is Getting Better at Evading Detection"A report recently released by Palo Alto Networks highlights the techniques used by the Iranian-linked hacker group, OilRig, to avoid being detected. A trojan used by the hacking group, called OopsIE, has been discovered by researchers to be able to…
-
"Hacker Using MikroTik Routers to Eavesdrop on Internet Traffic"Attackers have been exploiting a flaw contained by unpatched MikroTik routers in order to perform eavesdropping on users’ network traffic. According to Netlab researchers, over 7,500 MikroTik routers in countries including Russia, Iran, Brazil, and the…
-
"Boosting State Website Security"The security weaknesses in the Domain Name System (DNS) call for the increased implementation of DNSSEC by state governments. DNSSEC is a technical standard that enhances the security of the DNS by adding cryptographic signatures to DNS records. This…
-
"For 2nd Time in 3 Years, Mobile Spyware Maker mSpy Leaks Millions of Sensitive Records"A company by the name of mSpy has recently leaked sensitive information belonging to millions of its customers. mSpy provides phone monitoring software that allows users to spy on the mobile devices used by their children and partners. Nitish Shah, a…
-
"Access Misconfiguration Opens 3D Printers to Remote Attacks"Security researchers have brought attention to the vulnerability of over 3,700 3D printers to being attacked remotely. This vulnerability is due to the exposure of OctoPrint interfaces online without authentication. OctoPrint is an open source web…
-
"Knock, Knock: Digital Key Flaw Unlocks Door Control Systems"As a result of a flaw discovered in a commonly-used door controller, doors in corporate buildings such as office buildings and factories, could be unlocked by attackers. According to David Tomaschik, a security researcher from Google, the flaw…
News